From a41c3c73558c6ff03fdbbf9ddcd51f881711c5fb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 11 Feb 2025 21:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/31xxx/CVE-2023-31360.json | 86 +++- 2023/31xxx/CVE-2023-31361.json | 85 +++- 2024/0xxx/CVE-2024-0179.json | 556 +++++++++++++++++++++++- 2024/21xxx/CVE-2024-21924.json | 186 +++++++- 2024/21xxx/CVE-2024-21925.json | 745 ++++++++++++++++++++++++++++++++- 2025/0xxx/CVE-2025-0989.json | 8 +- 2025/26xxx/CVE-2025-26499.json | 18 + 2025/26xxx/CVE-2025-26500.json | 18 + 2025/26xxx/CVE-2025-26501.json | 18 + 2025/26xxx/CVE-2025-26502.json | 18 + 2025/26xxx/CVE-2025-26503.json | 18 + 2025/26xxx/CVE-2025-26504.json | 18 + 2025/26xxx/CVE-2025-26505.json | 18 + 2025/26xxx/CVE-2025-26506.json | 18 + 2025/26xxx/CVE-2025-26507.json | 18 + 2025/26xxx/CVE-2025-26508.json | 18 + 16 files changed, 1822 insertions(+), 24 deletions(-) create mode 100644 2025/26xxx/CVE-2025-26499.json create mode 100644 2025/26xxx/CVE-2025-26500.json create mode 100644 2025/26xxx/CVE-2025-26501.json create mode 100644 2025/26xxx/CVE-2025-26502.json create mode 100644 2025/26xxx/CVE-2025-26503.json create mode 100644 2025/26xxx/CVE-2025-26504.json create mode 100644 2025/26xxx/CVE-2025-26505.json create mode 100644 2025/26xxx/CVE-2025-26506.json create mode 100644 2025/26xxx/CVE-2025-26507.json create mode 100644 2025/26xxx/CVE-2025-26508.json diff --git a/2023/31xxx/CVE-2023-31360.json b/2023/31xxx/CVE-2023-31360.json index 7f80e4f8812..7e1375a18a6 100644 --- a/2023/31xxx/CVE-2023-31360.json +++ b/2023/31xxx/CVE-2023-31360.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31360", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@amd.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect default permissions in the AMD Integrated Management Technology (AIM-T) Manageability Service installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-276 Incorrect Default Permissions", + "cweId": "CWE-276" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AMD", + "product": { + "product_data": [ + { + "product_name": "AIM-T(AMD Integrated Management Technology) software", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "4.0.0.722" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9012.html", + "refsource": "MISC", + "name": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9012.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/31xxx/CVE-2023-31361.json b/2023/31xxx/CVE-2023-31361.json index 07f667d32b7..e63c1d7432f 100644 --- a/2023/31xxx/CVE-2023-31361.json +++ b/2023/31xxx/CVE-2023-31361.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31361", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@amd.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A DLL hijacking vulnerability in AMD Integrated Management Technology (AIM-T) Manageability Service could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AMD", + "product": { + "product_data": [ + { + "product_name": "AIM-T (AMD Integrated Management Technology) software", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "4.0.0.722" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9012.html", + "refsource": "MISC", + "name": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9012.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/0xxx/CVE-2024-0179.json b/2024/0xxx/CVE-2024-0179.json index 053d60c20d4..5ed48b3c25e 100644 --- a/2024/0xxx/CVE-2024-0179.json +++ b/2024/0xxx/CVE-2024-0179.json @@ -1,17 +1,565 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-0179", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@amd.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SMM Callout vulnerability within the AmdCpmDisplayFeatureSMM driver could allow locally authenticated attackers to overwrite SMRAM, potentially resulting in arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AMD", + "product": { + "product_data": [ + { + "product_name": "AMD Ryzen\u2122 3000 Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4PI 1.0.0.C" + }, + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 5000 Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7000 Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM5PI 1.2.0.2b" + }, + { + "status": "unaffected", + "version": "ComboAM5PI 1.1.0.3b" + }, + { + "status": "unaffected", + "version": "ComboAM5PI 1.0.0.a" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4PI 1.0.0.C" + }, + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 4000 Series Desktop Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 8000 Series Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM5PI 1.2.0.2b" + }, + { + "status": "unaffected", + "version": "ComboAM5PI 1.1.0.3b" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "CastlePeakPI-SP3r3 1.0.0.D" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "CastlePeakWSPI-sWRX8 1.0.0.F" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 7000 WX-Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "StormPeakPI-SP6 1.1.0.0h" + }, + { + "status": "unaffected", + "version": "StormPeakPI-SP6 1.0.0.1j" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PicassoPI-FP5 1.0.1.2a" + }, + { + "status": "unaffected", + "version": "PollockPI-FT5 1.0.0.8a" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PicassoPI-FP5 1.0.1.2a" + } + ], + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PicassoPI-FP5 1.0.1.2a" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PicassoPI-FP5 1.0.1.2a" + } + ], + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "RenoirPI-FP6 1.0.0.Ea" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "CezannePI-FP6 1.0.1.1a" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "MendocinoPI-FT6 1.0.0.7a" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 6000 Series Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "RembrandtPI-FP7 1.0.0.Ba" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7035 Series Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "RembrandtPI-FP7 1.0.0.Ba" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PhoenixPI-FP8-FP7 1.1.8.0" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 8040 Series Mobile Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PhoenixPI-FP8-FP7 1.1.8.0" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7000 Series Mobile Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "DragonRangeFL1PI 1.0.0.3f" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded V2000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbeddedPI-FP6 1.0.0.B" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded V3000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbeddedPI_FP7R2 1.0.0.C" + } + ], + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded 8000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbeddedPhoenixPI-FP7r2_1.2.0.0" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7027.html", + "refsource": "MISC", + "name": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7027.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/21xxx/CVE-2024-21924.json b/2024/21xxx/CVE-2024-21924.json index c3b451c2b5f..c94bd86d967 100644 --- a/2024/21xxx/CVE-2024-21924.json +++ b/2024/21xxx/CVE-2024-21924.json @@ -1,17 +1,195 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-21924", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@amd.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SMM callout vulnerability within the AmdPlatformRasSspSmm driver could allow a ring 0 attacker to modify boot services handlers, potentially resulting in arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250 Execution with Unnecessary Privileges", + "cweId": "CWE-250" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AMD", + "product": { + "product_data": [ + { + "product_name": "AMD EPYC\u2122 7002 Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "Rome PI 1.0.0.K" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ChagallWSPI-sWRX8 1.0.0.9" + } + ], + "defaultStatus": "unknown" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "CastlePeakWSPI-sWRX8 1.0.0.E" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX- Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ChagallWSPI-sWRX8 1.0.0.9" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 7000 WX-Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "StormPeakPI-SP6 1.1.0.0h" + } + ], + "defaultStatus": "unknown" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "StormPeakPI-SP6 1.0.0.1j" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 Embedded 7002 Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbRomePI-SP3 1.0.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7028.html", + "refsource": "MISC", + "name": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7028.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/21xxx/CVE-2024-21925.json b/2024/21xxx/CVE-2024-21925.json index 8e7bde8581f..7d697618e22 100644 --- a/2024/21xxx/CVE-2024-21925.json +++ b/2024/21xxx/CVE-2024-21925.json @@ -1,17 +1,754 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-21925", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@amd.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper input validation within the AmdPspP2CmboxV2 driver may allow a privileged attacker to overwrite SMRAM, leading to arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AMD", + "product": { + "product_data": [ + { + "product_name": "AMD EPYC\u2122 7001 Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "Naples PI 1.0.0.N" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 7002 Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "Rome PI 1.0.0.K" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 9004 Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "Genoa PI 1.0.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 7003 Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "Milan PI 1.0.0.E" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 3000 Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4PI 1.0.0.C" + }, + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 5000 Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7000 Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM5PI 1.2.0.2b" + }, + { + "status": "unaffected", + "version": "ComboAM5PI 1.1.0.3b" + }, + { + "status": "unaffected", + "version": "ComboAM5PI 1.0.0.a" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4PI 1.0.0.C" + }, + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 4000 Series Desktop Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM4v2PI 1.2.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 8000 Series Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ComboAM5PI 1.2.0.2b" + }, + { + "status": "unaffected", + "version": "ComboAM5PI 1.1.0.3b" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "CastlePeakPI-SP3r3 1.0.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "CastlePeakWSPI-sWRX8 1.0.0.F" + }, + { + "status": "unaffected", + "version": "ChagallWSPI-sWRX8 1.0.0.9" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX- Series Desktop Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "ChagallWSPI-sWRX8 1.0.0.9" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Threadripper\u2122 PRO 7000 WX-Series Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "StormPeakPI-SP6 1.1.0.0h" + }, + { + "status": "unaffected", + "version": "StormPeakPI-SP6 1.0.0.1j" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PicassoPI-FP5 1.0.1.2a" + }, + { + "status": "unaffected", + "version": "PollockPI-FT5 1.0.0.8a" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PicassoPI-FP5 1.0.1.2a" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "RenoirPI-FP6 1.0.0.Ea" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "CezannePI-FP6 1.0.1.1a" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "MendocinoPI-FT6 1.0.0.7a" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 6000 Series Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "RembrandtPI-FP7 1.0.0.Ba" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7035 Series Processor with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "RembrandtPI-FP7 1.0.0.Ba" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PhoenixPI-FP8-FP7 1.1.8.0" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 8040 Series Mobile Processors with Radeon\u2122 Graphics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "PhoenixPI-FP8-FP7 1.1.8.0" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 7000 Series Mobile Processors", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "DragonRangeFL1PI 1.0.0.3f" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 Embedded 3000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "SnowyOwlPI 1.1.0.E" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 Embedded 7002", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbRomePI-SP3 1.0.0.D" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 Embedded 7003", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbMilanPI-SP3 1.0.0.A" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD EPYC\u2122 Embedded 9004", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbGenoaPI 1.0.0.9" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded 5000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbAM4PI 1.0.0.7" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded 7000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbeddedV2KAPI-FP6 1.0.0.7" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded V2000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbeddedPI-FP6 1.0.0.B" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded V3000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbeddedPI_FP7R2 1.0.0.C" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + }, + { + "product_name": "AMD Ryzen\u2122 Embedded 8000", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "EmbeddedPhoenixPI-FP7r2_1.2.0.0" + } + ], + "defaultStatus": "unknown" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7027.html", + "refsource": "MISC", + "name": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7027.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2025/0xxx/CVE-2025-0989.json b/2025/0xxx/CVE-2025-0989.json index c3d5340d518..2113faebd9a 100644 --- a/2025/0xxx/CVE-2025-0989.json +++ b/2025/0xxx/CVE-2025-0989.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-0989", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-12315. Reason: This candidate is a reservation duplicate of CVE-2024-12315. Notes: All CVE users should reference CVE-2024-12315 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2025/26xxx/CVE-2025-26499.json b/2025/26xxx/CVE-2025-26499.json new file mode 100644 index 00000000000..0bb3ca4f47c --- /dev/null +++ b/2025/26xxx/CVE-2025-26499.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26499", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26500.json b/2025/26xxx/CVE-2025-26500.json new file mode 100644 index 00000000000..d15971d4613 --- /dev/null +++ b/2025/26xxx/CVE-2025-26500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26501.json b/2025/26xxx/CVE-2025-26501.json new file mode 100644 index 00000000000..3fd289900b4 --- /dev/null +++ b/2025/26xxx/CVE-2025-26501.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26501", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26502.json b/2025/26xxx/CVE-2025-26502.json new file mode 100644 index 00000000000..e54b5b27940 --- /dev/null +++ b/2025/26xxx/CVE-2025-26502.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26502", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26503.json b/2025/26xxx/CVE-2025-26503.json new file mode 100644 index 00000000000..ed78bf96c8a --- /dev/null +++ b/2025/26xxx/CVE-2025-26503.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26503", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26504.json b/2025/26xxx/CVE-2025-26504.json new file mode 100644 index 00000000000..6efcbca08a0 --- /dev/null +++ b/2025/26xxx/CVE-2025-26504.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26504", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26505.json b/2025/26xxx/CVE-2025-26505.json new file mode 100644 index 00000000000..fd3a4aadc90 --- /dev/null +++ b/2025/26xxx/CVE-2025-26505.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26505", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26506.json b/2025/26xxx/CVE-2025-26506.json new file mode 100644 index 00000000000..2a8481eb400 --- /dev/null +++ b/2025/26xxx/CVE-2025-26506.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26506", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26507.json b/2025/26xxx/CVE-2025-26507.json new file mode 100644 index 00000000000..de6c708bf8f --- /dev/null +++ b/2025/26xxx/CVE-2025-26507.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26507", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26508.json b/2025/26xxx/CVE-2025-26508.json new file mode 100644 index 00000000000..d9324694e35 --- /dev/null +++ b/2025/26xxx/CVE-2025-26508.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26508", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file